Author:
Li Yanbin,Tang Ming,Li Yuguang,Zhang Huanguo
Funder
National Natural Science Foundation of China
Subject
Electrical and Electronic Engineering,Hardware and Architecture,Software
Reference29 articles.
1. S. Mangard, E. Oswald, T. Popp, Power analysis attacks: Revealing the secrets of smart cards, Vol. 31, Springer Science & Business Media, 2008.
2. Power and electromagnetic analysis: improved model, consequences and comparisons;Peeters;Integr. VLSI J.,2007
3. S. Chari, C.S. Jutla, J.R. Rao, P. Rohatgi, Towards sound approaches to counteract power-analysis attacks, in: Proceedings of the Annual International Cryptology Conference, Springer, 1999, pp. 398–412.
4. M.-L. Akkar, C. Giraud, An implementation of des and aes, secure against some attacks, in: Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Springer, 2001, pp. 309–318.
5. J. Blömer, J. Guajardo, V. Krummel, Provably secure masking of aes, in: Proceedings of the International Workshop on Selected Areas in Cryptography, Springer, 2004, pp. 69–83.